Search alternatives:
interfaces encryption » interfaces exception, interfaces exceptions, interfaces perception
encryption processing » encryption process, encryption providing, encryption proving
processing problems » programming problems
https » http
1
Published 2014
Table of Contents: ... -- Administrating MANETs via Brain Computer Interface (BCI) -- Parameter Estimation and Soft Computing Techniques...
View full text
Electronic eBook
2
Published 2010
Table of Contents: ... for Video On-Line Processing -- Application of Shape Description Methodology to Hand Radiographs...
View full text
Electronic eBook
3
Published 2010
Table of Contents: ... System Using Collaborative Filtering on Fashion E-Business -- Intelligent Computing for Data Security...
View full text
Electronic eBook
4
Published 2010
Table of Contents: ... -- Innovations in Computation and Application -- Fuzzy Decision Making for IJV Performance Based on Statistical...
View full text
Electronic eBook
5
Published 2015
Table of Contents: ...-Based Encryption Optimized for Cloud Computing -- Trustworthy Virtualization of the ARMv7 Memory...
View full text
Electronic eBook
6
Published 2008
Table of Contents: ... for Secure XML Query Processing in Data Streams -- An Approach to Trust Management Challenges for Critical...
View full text
Electronic eBook
7
Published 2014
Table of Contents: ... Analysis of the Infinity -- High Performance Computing for Mathematical Optimization Problem -- Part VI...
View full text
Electronic eBook
8
Subjects: ...Image Processing and Computer Vision. https://scigraph.springernature.com/ontologies/product-market...
View full text
Electronic eBook
9
Published 2007
Table of Contents: ... Computation in Large Territories -- Non-equilibrium Thermodynamics, Thermomechanics, Geodynamics -- A Finite...
View full text
Electronic eBook
10
Published 2014
Table of Contents: ... Process -- P300 Detection in Electroencephalographic Signals for Brain Computer Interface Systems: A...
View full text
Electronic eBook
11
Published 2015
Table of Contents: ... Diagram: A Soft Computing Approach -- Solving Non-linear Constrained Optimization Problems using Invasive...
View full text
Electronic eBook
12
Published 2007
Table of Contents: ... Computing Environment -- Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption...
View full text
Electronic eBook
13
Published 2010
Table of Contents: ... Facing Government Use of Cloud Computing -- Open Source Software (OSS) Adoption Framework for Local...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... with Network Coding -- A Virtual File System Interface for Computational Grids -- Security -- Labeled VoIP Data...
View full text
Electronic eBook
15
Published 2010
Table of Contents: ...Genetic-Annealing Algorithm in Grid Environment for Scheduling Problems -- Dynamic Increasing...
View full text
Electronic eBook
16
Published 2008
Table of Contents: ...-Pass Two-Party Key Establishment Protocol -- Zero Knowledge and Secure Computation Protocols...
View full text
Electronic eBook
17
Published 2014
Table of Contents: ... Classification in Brain-Computer Interface -- Enhancing Genetic Algorithm with Cumulative Probabilities to Derive...
View full text
Electronic eBook
18
Published 2006
Table of Contents: ...Specifying Instance Correspondence in Collaborative Business Processes -- Middleware Support...
View full text
Electronic eBook
19
Published 2010
Table of Contents: ... -- Hyperchaotic Encryption for Secure E-Mail Communication....
View full text
Electronic eBook
20
Published 2013
Table of Contents: ...Shortest Path Computation over Disk-Resident Large Graphs Based on Extended Bulk Synchronous...
View full text
Electronic eBook